


default search action
17th CSFW 2004: Pacific Grove, California, USA
- 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA. IEEE Computer Society 2004, ISBN 0-7695-2169-X
Protocols I
- Stéphanie Delaune, Florent Jacquemard:
A Theory of Dictionary Attacks and its Complexity. 2-15 - Olivier Pereira, Jean-Jacques Quisquater:
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols. 16-19 - Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation. 30-
Access Control
- Chiara Braghin, Daniele Gorla, Vladimiro Sassone:
A Distributed Calculus for Ro^le-Based Access Control. 48-60 - Frédéric Besson, Tomasz Blanc, Cédric Fournet, Andrew D. Gordon:
From Stack Inspection to Access Control: A Security Analysis for Libraries. 61-
Intrusion Detection
- Frédéric Cuppens, Sylvain Gombault, Thierry Sans:
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. 78-87 - Magnus Almgren, Erland Jonsson:
Using Active Learning in Intrusion Detection. 88-
Information Flow
- Gilles Barthe
, Pedro R. D'Argenio, Tamara Rezk:
Secure Information Flow by Self-Composition. 100-114 - Zhenyue Deng, Geoffrey Smith:
Lenient Array Operations for Practical Secure Information Flow. 115-
Security Policies
- Hubie Chen, Stephen Chong:
Owned Policies for Information Security. 126-138 - Moritz Y. Becker, Peter Sewell
:
Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 139-154 - Kaijun Tan, Jason Crampton, Carl A. Gunter:
The Consistency of Task-Based Authorization Constraints in Workflow Systems. 155-
Declassification and Information Flow
- Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic:
Enforcing Robust Declassification. 172-186 - Annalisa Bossi, Carla Piazza, Sabina Rossi:
Modelling Downgrading in Information Flow Security. 187-
Formal Methods and Cryptography
- Michael Backes, Birgit Pfitzmann:
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. 204-218 - Ran Canetti:
Universally Composable Signature, Certification, and Authentication. 219-
Authorization
- Nathan Whitehead, Martín Abadi, George C. Necula:
By Reason and Authority: A System for Authorization of Proof-Carrying Code. 236-250 - Joseph Y. Halpern, Vicky Weissman:
A Formal Foundation for XrML. 251-
Protocols II
- Rohit Chadha, Steve Kremer, Andre Scedrov:
Formal Analysis of Multi-Party Contract Signing. 266-265 - Ron van der Meyden, Kaile Su:
Symbolic Model Checking the Knowledge of the Dining Cryptographers. 280-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.